Find XSS payloads that actually work by filtering them based on real-world constraints instead of blind payload spraying.
☆139Jan 12, 2026Updated last month
Alternatives and similar repositories for XSSNow
Users that are interested in XSSNow are comparing it to the libraries listed below
Sorting:
- ExecEvasion is a lightweight execution-evasion toolkit that generates command variants designed to bypass naive filters and WAF rules by …☆49Jan 31, 2026Updated last month
- Browser-based Android security auditing tool.☆62Feb 6, 2026Updated 3 weeks ago
- ☆28Jan 19, 2026Updated last month
- This lab is for **EDUCATIONAL PURPOSES ONLY**. Use it responsibly and only on systems you own or have explicit permission to test. Do not…☆17Feb 20, 2026Updated last week
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 8 months ago
- Some ELF Malwares☆10Mar 11, 2022Updated 3 years ago
- Custom Trickest Workflows☆12Oct 26, 2023Updated 2 years ago
- Pure PowerShell port of PassTheCert tool to authenticate to an LDAP/S server with a certificate through Schannel☆59Apr 13, 2025Updated 10 months ago
- a critical memory disclosure vulnerability in MongoDB's zlib compression handling. This tool allows security researchers to extract sensi…☆26Dec 27, 2025Updated 2 months ago
- Meteorology reports and forecasts, satellite pass predictions, communications decoding, and imagery analysis for NOAA satellites 🌧 🛰 📡☆17Jul 30, 2023Updated 2 years ago
- Pipe nmap verbose output to a usable format for httpx or host:port notation.☆16Jul 7, 2022Updated 3 years ago
- ☆27Sep 5, 2025Updated 5 months ago
- Bug Bounty Setup Tools On Fresh VPS. This scripts automatically installs top bug bounty tools and set up environment in newly installed …☆30Jan 27, 2026Updated last month
- ☆19Jun 8, 2017Updated 8 years ago
- A bash script to create a persistent port mirror for an IDS within a Proxmox hypervisor☆20Sep 4, 2018Updated 7 years ago
- ☆89Sep 13, 2025Updated 5 months ago
- A list of commands, tools and notes about enumerating and exploiting Active Directory and how to defend against these attacks☆23Jun 22, 2021Updated 4 years ago
- A flexible Boolean Based SQL injection tool☆20Nov 15, 2022Updated 3 years ago
- Fork repository for CryptoCat's "Binary Exploitation 101 Course" AKA "Practical Buffer Overflow Exploitation"☆22Dec 9, 2022Updated 3 years ago
- Burp Suite Extension for inserting a magic byte into responder's request☆24Sep 22, 2023Updated 2 years ago
- govenom is a msfvenom-inspired cross-platform payload generator toolkit written in Go☆21Sep 9, 2020Updated 5 years ago
- CLI tool that fetches resolved & disclosed HackerOne reports by vulnerability and exports them to CSV.☆36Sep 14, 2025Updated 5 months ago
- This project is move advanced version of https://github.com/WKL-Sec/HiddenDesktop☆50Jan 11, 2026Updated last month
- Another version of .NET loader provides capabilities of bypassing ETW and AMSI, utilizing VEH for syscalls and loading .NET assemblies☆50Jul 6, 2025Updated 7 months ago
- Repository contains a collection of scripts designed to demonstrate and exploit various vulnerabilities in HTTP and related protocols☆30Nov 24, 2025Updated 3 months ago
- Monitor your targets and hunt fresh assets in real time.☆151Feb 23, 2026Updated last week
- Perform with Massive Command Injection (Chamilo)☆23Jul 31, 2023Updated 2 years ago
- ☆39May 4, 2025Updated 10 months ago
- ☆48Jul 30, 2025Updated 7 months ago
- A userscript to assist in detecting cross-site scripting vulnerabilities☆26Jun 24, 2010Updated 15 years ago
- Research project showcasing various malware evasion techniques used to bypass AVs and EDRs, continuously updated with new methods.☆38Jan 8, 2025Updated last year
- PowerShell collector for adding SCCM attack paths to BloodHound with OpenGraph☆72Updated this week
- Private nuclei templates for BBP and OT/IIoT/MIoT enumeration, use responsibly☆35Aug 27, 2025Updated 6 months ago
- Subdomain Enumerator and Simple Crawler☆348Feb 12, 2026Updated 2 weeks ago
- This script scrapes the list of open Bug Bounty Programs from openbugbounty.org☆28Mar 22, 2022Updated 3 years ago
- CVE-2025-56383-Proof-of-Concept☆55Sep 26, 2025Updated 5 months ago
- Some contributions in the nuclei-templates repository☆62Jun 18, 2022Updated 3 years ago
- 0xJS is an AI-powered JavaScript Security Tool☆34Feb 22, 2026Updated last week
- ☆477Aug 21, 2025Updated 6 months ago